Related Books

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Language: en
Pages: 427
Authors: Eric Cole
Categories: Computers
Type: BOOK - Published: 2005-12-15 - Publisher: Elsevier

DOWNLOAD EBOOK

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most s
Versatile Cybersecurity
Language: en
Pages: 295
Authors: Mauro Conti
Categories: Computers
Type: BOOK - Published: 2018-10-17 - Publisher: Springer

DOWNLOAD EBOOK

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enter
Security Log Management
Language: en
Pages: 352
Authors: Jacob Babbin
Categories: Business & Economics
Type: BOOK - Published: 2006-01-27 - Publisher: Elsevier

DOWNLOAD EBOOK

This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to m
From Database to Cyber Security
Language: en
Pages: 498
Authors: Pierangela Samarati
Categories: Computers
Type: BOOK - Published: 2018-11-30 - Publisher: Springer

DOWNLOAD EBOOK

This Festschrift is in honor of Sushil Jajodia, Professor in the George Mason University, USA, on the occasion of his 70th birthday. This book contains papers w
How to Cheat at Managing Information Security
Language: en
Pages: 345
Authors: Mark Osborne
Categories: Computers
Type: BOOK - Published: 2006-08-22 - Publisher: Elsevier

DOWNLOAD EBOOK

This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security